A denial of service attack to UMTS networks using SIM-less devices
A Merlo, M Migliardi, N Gobbo… - … on Dependable and …, 2014 - ieeexplore.ieee.org
One of the fundamental security elements in cellular networks is the authentication
procedure performed by means of the Subscriber Identity Module that is required to grant …
procedure performed by means of the Subscriber Identity Module that is required to grant …
TTP based high-efficient multi-key exchange protocol
With a trusted-third-party (TTP)-based key exchange protocol, when a user would like to
transmit a message to another user, the transmitted data are encrypted by a session key …
transmit a message to another user, the transmitted data are encrypted by a session key …
An improved authentication and security scheme for LTE/LTE-A networks
PK Panda, S Chattopadhyay - Journal of Ambient Intelligence and …, 2020 - Springer
Long term evolution (LTE) and LTE-Advanced networks support highly developed
authentication and encryption mechanisms. However, these systems still suffer from various …
authentication and encryption mechanisms. However, these systems still suffer from various …
Data encryption method using environmental secret key with server assistance
Data encryption is an effective method for enterprises and government offices to protect their
important information from being lost or leaked, especially when data is transmitted on the …
important information from being lost or leaked, especially when data is transmitted on the …
[PDF][PDF] An E-lottery system with a fair purchasing environment and an arbitration mechanism
Lottery is an attractive game as the winning player can potentially receive a huge amount of
prize money. Advances in Internet and communications technologies and the popularity of …
prize money. Advances in Internet and communications technologies and the popularity of …
Interdisciplinary engineering education: a problem-oriented approach
VN Vasiliev, IP Gurov - … of Frontiers in Education FIE'96 26th …, 1996 - ieeexplore.ieee.org
It seems that there is the paradox in the title. Interdisciplinarity and only one problem being
solved are the neighbors. The answer is contained in the complexity of modern …
solved are the neighbors. The answer is contained in the complexity of modern …
Random Cladding with Feedback Mechanism for encrypting mobile messages
In mobile communication, messages are delivered via the air. This may attract hackers to
eavesdrop and then break them. Hence, the security is an important issue needed to be …
eavesdrop and then break them. Hence, the security is an important issue needed to be …
Enhanced security scheme with mutual authentication for WiMAX system
PK Panda, S Chattopadhyay - 2017 8th International …, 2017 - ieeexplore.ieee.org
A novel enhanced security scheme with “mutual authentication” has been proposed in this
paper for “WiMAX” environment. This system integrates “Random Number …
paper for “WiMAX” environment. This system integrates “Random Number …
A Cladded Feedback Approach to Construct Highly Secure and High Performance Cladded Ciphertext Files
Y Lakshmi, K Sudhir, T Malleshwari - International Journal for …, 2018 - papers.ssrn.com
In mobile communication, messages are sent by means that of the air. this might attract
programmers to spy and at the moment break them. Later on, the safety may be an important …
programmers to spy and at the moment break them. Later on, the safety may be an important …
Self-parameter Based Bilateral Session Key Exchange Method
Bilateral session key exchange as an symmetric encryption scheme is often utilized in
temporary data communication. Users can encrypt data with exchanged session keys and …
temporary data communication. Users can encrypt data with exchanged session keys and …